Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - NWPP
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
Not required.
Item 1B. Unresolved Staff Comments
Not applicable.
Item 1C. Cybersecurity
The Cyber Incident Reporting for Critical Infrastructure Act, enacted in March 2022, requires certain covered entities to report a covered incident to the U.S. Department of Homeland Security's Cybersecurity & Infrastructure Security Agency (“CISA”) within 72 hours after a covered entity reasonably believes an incident has occurred. Separate reporting to CISA will also be required within 24 hours if a ransom payment is made as a result of a ransomware attack.
The SEC adopted a new rule on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies in 2024, which applies to all public companies subject to the reporting requirements of the Securities Exchange Act of 1934 and requires disclosure of material cybersecurity incidents in Current Reports on Form 8-K and periodic disclosure of cybersecurity risk management, strategy, and governance in Annual Reports on Form 10-K.
Our Enterprise Risk Management program (“ERM”) is designed to identify, assess, and mitigate risks across various aspects of New Peoples, including financial, operational, regulatory, reputational, and legal. The ERM program includes an annual risk prioritization process to identify key enterprise risks. Each key risk is assigned a risk owner to establish action plans and implement risk mitigation strategies. Cybersecurity is a critical component of this program. Given the increasing reliance on technology and potential cyber threats, New Peoples uses a cybersecurity framework to aid management in understanding, managing, and reducing cybersecurity risk. This framework aids management in identifying gaps within cybersecurity infrastructure and evaluating maturity of processes. Cybersecurity frameworks use maturity levels to gauge the strength of cybersecurity controls. Our information technology and vendor risk management functions assess information technology and cybersecurity third party providers as part of the initial determination process and then periodically thereafter. We use a variety of methods and tools to assess a
16
We maintain a comprehensive Business Continuity Management program that includes Business Continuity, Disaster Recovery, and Incident Response planning and testing. This program is designed to minimize the impact of an information security disruption and ensure New Peoples can return to normal operations in a timely manner. The Information Security Officer is responsible for the administration and management of the program and key members of management are embedded into the program by its design. At least annually, management identifies an exhaustive list of business functions for each area of New Peoples, and lists resource requirements, assigns Recovery Time and Point Objectives, and Maximum Tolerable Period of Downtime for each function. Management then completes a comprehensive Business Impact Analysis that prioritizes business functions based on criticality and is used as a guide for business continuity and disaster recovery planning. We maintain an Incident Response Plan that provides a documented framework for responding to actual or potential cybersecurity incidents, including timely notification of and escalation to the appropriate Board-approved management committees, and to the Information Technology Steering Committee. The Incident Response Plan facilitates coordination across multiple parts of our organization. Business Continuity, Disaster Recovery, and Incident Response plans are updated and tested at least annually. Management performs a variety of tests on the plans including tabletop, simulation, and technical testing to ensure key personnel are prepared, recovery systems and data are viable, and Recovery Time and Point Objectives can be met. Weaknesses identified during testing are monitored until they are fully remediated. The Information Technology Steering Committee provides oversight for the Business Continuity Management Program, which includes ratification of plans and Business Impact Analysis, plan testing frequency, and remediation of identified weaknesses. The Committee ensures, based on testing, that plans are adequate to meet New Peoples’s objectives.
In the ordinary course of its business, the Bank relies on electronic communications and information systems to conduct its operations and to store sensitive data and employs a variety of preventative and detective tools to monitor, block, and provide alerts regarding suspicious activity, as well as to report on any suspected advanced persistent threats. Notwithstanding these defensive measures, the threat from cybersecurity attacks is severe, attacks are sophisticated and increasing in volume, and attackers respond rapidly to changes in defensive measures.
17
Recently Filed
| Ticker * | File Date |
|---|---|
| LIXT | 4 minutes ago |
| BLFY | 5 minutes ago |
| WORX | 9 minutes ago |
| BICX | 12 minutes ago |
| FCCN | 13 minutes ago |
| COBA | 14 minutes ago |
| WAMFF | 16 minutes ago |
| APCX | 27 minutes ago |
| GEDC | 29 minutes ago |
| INVU | 33 minutes ago |
| BOF | 36 minutes ago |
| FGBI | 38 minutes ago |
| VYCO | 41 minutes ago |
| GLTK | 45 minutes ago |
| QURT | 51 minutes ago |
| KWIK | 52 minutes ago |
| BNKK | 56 minutes ago |
| SPEV | an hour ago |
| MSSAF | an hour ago |
| POSC | an hour ago |
| MIRA | an hour ago |
| BBLR | an hour ago |
| ALDA | an hour ago |
| HGTXU | an hour ago |
| NXTT | an hour ago |
| NWPP | an hour ago |
| FCUV | an hour ago |
| MAGE | an hour ago |
| RWAX | an hour ago |
| MNTS | 2 hours ago |
| IVFH | 2 hours ago |
| NGLD | 2 hours ago |
| QSJC | 3 hours ago |
| MVNC | 3 hours ago |
| TONX | 3 hours ago |
| TJX | 3 hours ago |
| MDBH | 3 hours ago |
| VTAK | 4 hours ago |
| DEFI | 4 hours ago |
| KLNG | 5 hours ago |
| PRPL | 5 hours ago |
| MMTRS | 5 hours ago |
| RSRV | 5 hours ago |
| PLMK | 5 hours ago |
| CBAT | 6 hours ago |
| XBP | 6 hours ago |
| CDZI | 6 hours ago |
| DQWS | 6 hours ago |
| CVKD | 6 hours ago |
| IPDN | 6 hours ago |